QID 751038

Date Published: 2021-08-31

QID 751038: SUSE Enterprise Linux Security Update for unrar (SUSE-SU-2021:2834-1)

This update for unrar to version 5.6.1 fixes several issues.
These security issues were fixed: - cve-2017-12938: prevent remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the .
Directory, a symlink to the .. directory, and a regular file (bsc#1054038).
- cve-2017-12940: prevent out-of-bounds read in the encodefilename::decode call within the archive::readheader15 function (bsc#1054038).
- cve-2017-12941: prevent an out-of-bounds read in the unpack::unpack20 function (bsc#1054038).
- cve-2017-12942: prevent a buffer overflow in the unpack::longlz function (bsc#1054038).
- cve-2017-20006: fixed heap-based buffer overflow in unpack:copystring (bsc#1187974).
These non-security issues were fixed: - added extraction support for .lz archives created by lzip compressor - enable unpacking of files in zip archives compressed with xz algorithm and encrypted with aes - added support for pax extended headers inside of tar archive - if rar recovery volumes (.rev files) are present in the same folder as usual rar volumes, archive test command verifies .rev contents after completing testing .rar files - by default unrar skips symbolic links with absolute paths in link target when extracting unless -ola command line switch is specified - added support for aes-ni cpu instructions - support for a new rar 5.0 archiving format - wildcard exclusion mask for folders - prevent conditional jumps depending on uninitialised values (bsc#1046882)

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2834-1 to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2834-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html